Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The need for unique passwords brings me to a stupid idea that I've had for a while.

Imagine a service which just stores hashes of every password that it can find from everywhere. Any site that wants can check whether a given password is in use..somewhere..and reject it if it is. Any site that wants can add more passwords to the list.

Internally the service would work from a bloom table designed for a fixed false positive rate. (You can actually layer bloom tables in front of bloom tables with parameters to make this possible.) So even if someone compromises that site, there is no direct record of the actual hashes for passwords.

Basically let sites say, "You have to choose a unique password, and do not reuse a password that anyone has used elsewhere!"



This would only work if you could achieve this search with the use of a zero-knowledge proof. Actually disclosing your password to the service would defeat the point.


Yes, this is a weakness. The password would need to be disclosed in the form of a hash of the password, and the hash algorithm has to match what everyone else does.

If the service and your site were both compromised, then it would be possible to match up incoming hashed passwords to users by timestamp. But even so, the fact that no passwords were reused will hopefully make cracking the hashes harder.

So..probably a bad idea. :-(



Compromises are not points in time, they tend to be intervals. A long enough interval could do more harm than good here.


Lastpass has a password-auditing feature that checks your passwords against a list of known-leaked common passwords.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: